forked from AGWA/titus
-
Notifications
You must be signed in to change notification settings - Fork 0
/
rsa_server.cpp
116 lines (102 loc) · 3.86 KB
/
rsa_server.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
/*
* Copyright (C) 2014 Andrew Ayer
*
* Permission is hereby granted, free of charge, to any person obtaining a
* copy of this software and associated documentation files (the "Software"),
* to deal in the Software without restriction, including without limitation
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
* and/or sell copies of the Software, and to permit persons to whom the
* Software is furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included
* in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
* OTHER DEALINGS IN THE SOFTWARE.
*
* Except as contained in this notice, the name(s) of the above copyright
* holders shall not be used in advertising or otherwise to promote the
* sale, use or other dealings in this Software without prior written
* authorization.
*/
#include "rsa_server.hpp"
#include "util.hpp"
#include <stdint.h>
#include <openssl/rsa.h>
#include <memory>
namespace {
void send_to_client (int sock, const void* data, size_t len)
{
write_all(sock, data, len);
}
void recv_from_client (int sock, void* data, size_t len)
{
if (!read_all(sock, data, len)) {
throw Key_protocol_error("Client ended connection prematurely");
}
}
void rsa_server_private_decrypt (const std::vector<openssl_unique_ptr<RSA>>& keys, int sock)
{
uintptr_t key_id;
int padding;
int flen;
recv_from_client(sock, &key_id, sizeof(key_id));
recv_from_client(sock, &padding, sizeof(padding));
recv_from_client(sock, &flen, sizeof(flen));
if (key_id >= keys.size()) {
throw Key_protocol_error("Client sent unknown key ID");
}
if (flen < 0 || flen > 65536) {
throw Key_protocol_error("Client sent invalid flen value");
}
std::unique_ptr<unsigned char[]> from(new unsigned char[flen]);
recv_from_client(sock, from.get(), flen);
std::unique_ptr<unsigned char[]> to(new unsigned char[RSA_size(keys[key_id].get())]);
int plain_len = RSA_private_decrypt(flen, from.get(), to.get(), keys[key_id].get(), padding);
send_to_client(sock, &plain_len, sizeof(plain_len));
if (plain_len > 0) {
send_to_client(sock, to.get(), plain_len);
}
}
void rsa_server_private_encrypt (const std::vector<openssl_unique_ptr<RSA>>& keys, int sock)
{
uintptr_t key_id;
int padding;
int flen;
recv_from_client(sock, &key_id, sizeof(key_id));
recv_from_client(sock, &padding, sizeof(padding));
recv_from_client(sock, &flen, sizeof(flen));
if (key_id >= keys.size()) {
throw Key_protocol_error("Client sent unknown key ID");
}
if (flen < 0 || flen > 65536) {
throw Key_protocol_error("Client sent invalid flen value");
}
std::unique_ptr<unsigned char[]> from(new unsigned char[flen]);
recv_from_client(sock, from.get(), flen);
std::unique_ptr<unsigned char[]> to(new unsigned char[RSA_size(keys[key_id].get())]);
int sig_len = RSA_private_encrypt(flen, from.get(), to.get(), keys[key_id].get(), padding);
send_to_client(sock, &sig_len, sizeof(sig_len));
if (sig_len > 0) {
send_to_client(sock, to.get(), sig_len);
}
}
}
void run_rsa_server (std::vector<openssl_unique_ptr<RSA>> keys, filedesc sock)
{
uint8_t command;
while (read_all(sock, &command, sizeof(command))) {
if (command == 1) {
rsa_server_private_decrypt(keys, sock);
} else if (command == 2) {
rsa_server_private_encrypt(keys, sock);
} else {
throw Key_protocol_error("Client sent unknown command");
}
}
}